Archive for June, 2011

Power: Three years in the making, AX 2012 has more than 1200 feature additions and enhancements over the prior version, adding tremendous depth of power and functionality across all areas of product. AX 2012 supports more than 40 roles within an organization from the shop floor to the top floor in both commercial businesses and public sector organizations. AX 2012 is designed from the ground up to support organizations of all sizes with multiple lines of business and multi-national operations. It also performs well as the operations component of any hub and spoke configuration within the largest of enterprises, a role it plays for 12 business units within Microsoft today and for other enterprise customers.

Simplicity: From the beginning AX has had an architectural elegance based on a single metadata repository that driven the user and developer experience, allowing amazing flexibility in configuration and customization while lowering total cost of ownership. AX 2012 preserves that elegance and extends it. Every process for both IT administrators and end users is now simpler, easier, and more intuitive.

Synergy is perhaps best known for erp, payrol and finacial soltuions, however we also provide uesful utilties. Everyone uses emails and for those using Exchnage Server and Outlook, Exclaimer is a must have, low cost set of tools. Oneof htose is anti spam which is a daily growing problem.As you would expect Exclaimer doesn’t use inconsistent word-filtering to catch (or miss) spam. It analyzes data on global email traffic, so whatever its content, in any language, even with images, it spots it and stopa it. Maximum power, minimum false positives and zero effort – as expected.

With eBankRec from Synergy Software Systems import your bank’s file into a ‘matching‖ screen’ . The Ax system will automatically determine which items are a match (based on reference number and amount).

For those items that don’t automatically match, the user can look up entries and manually make the match.

Sometimes the bank entries will be a close match but not exact.

In this case, eBankRec can import the bank’s value and make an adjustment in AX… so that the bank’s value will be used.

The end result of the ―matching‖ process is a fully reconciled account, ready for posting to the general ledger.

eBankRec includes an easy to use application to map the bank’s layout to the AX reconciliation fields. In addition to BAI2, fixed-field length and comma-delimited file types are fully supported. Each AX bank account can have its own unique for multi-bank support

eBankRec provides for a lookup facility, to locate the appropriate AX transaction to match with the imported bank transaction.

eBankRec retains history. After the bank file is imported, it is kept in a history table once it is reconciled. Even when the statement has been posted, the history file can be reviewed.

Microsoft Dynamics AX 2012 supporst process, and discrete manufacturing, and saiban manufacturing models in a single solution with specilsit vertical soltuiosn for e.g rpitn and apckaging, or high tech industry..

The new operations resource model helps you to efficiently use resources at multiple locations.

Schedule resources (vendors, people, machines, tools, or locations) to jobs and operations based on their capabilities (ability to perform a specific production-related activity).

A scheduling engine will handle resource selection.

Model and execute lean manufacturing on production flows to reduce delivery lead times, trim excess inventory between work centers, treat contractor labor as a service (not a BOM component), and support continuous improvement by using kanban boards, event kanbans, and kanban rules to view, plan, and run kanban jobs.

The new constraint-based Product Configurator can efficiently create, maintain, and reuse product models, components, and attributes.

Shop floor workers can use the touch-enabled job registration form to register time and quantities produced; .

The Microsoft Global Virtual Launch Event for the next generation of Dynamics AX will be held on September 13, 2011. Microsoft Dynamics AX 2012 is developed while focusing on building an ERP solution tailored specifically to the way in which customers use it.

Dubai was known for its extravagant projects such as the Palm Jumeirah, artificial islands and the world’s tallest tower Burj Khalifa and as a result of the world fianncial crisis more recently ,having to put its finances back in order.

Dubai announced in a prospectus on Sunday that it would launch a new $5 billion Euro Medium Term Note framework for future debt issuance. A drop in the ocean vsDubai’s overall debt load iestimated at $115 billion or 140 percent of its economic output,.

So why the market confdence in Dubai? Tightening bond spreads and an oversubscribed bond from its flagship airline recently shows the appetite for Dubai debt rising in recent months, with the emirate seen as a safe haven as social unrest spread to Syrai, Bahrain, Oman and Yemen. The United Arab Emirates and Qatar are the only two states in the Gulf, the world’s top oil exporting region, which have not seen any protests inspired by uprisings that toppled leaders in Egypt and Tunisia. Dubai’s budget deficit more than halved to 6.02 billion dirhams ($1.64 billion) or 2 percent of gross domestic product last year from 2009

SHRINKING GAP

The shape of Dubai’s finances is expected to improveagain this year helped by banking sector stabilization, trade recovery, oil prices at around $100 per barrel as well as austerity measures. Revenue is likely to exceed that set out in the budget. The out turn will depend on actual spending levels

In January, Dubai’s ruler approved a 2011 government budget with a lowest deficit in four years of 3.78 billion dirhams, or 1.3 percent of economic output, with revenue set at 29.91 billion and expenditures of 33.7 billion, slightly below 2010. Dubai lacksthe oil wealth of neighboring Abu Dhabi, but has no current plans to implement corporate or income taxes, . Various fees from housing to tourism make up around 62 percent of its budget. and Besides customs duties, Dubai levies a 20 percent income tax on profits earned by foreign banks.

The public sector plays a leading role in the Dubai economy, which accounts for 28 percent of the overall output of the UAE, the world’s No.3 oil exporter, but the direct government spending amounts to just 10 percent of GDP. A government official said in May that Dubai, bracing for some $30 billion in debt redemptions over the next two years, plans to cut state spending by 20 to 25 percent until 2013 to further narrow its funding gap.

Dubai’s trade and property-based economy expanded by 2.4 percent last year, higher than a previous 2.2 percent estimate by the emirate’s statistics office. It had shrunk by 2.4 percent in 2009. The tourist sector has benefitted from troubles elsewhere in the region. Dubai Ports are busy with increasing world trade, new airport road and the metro, and improvments in roads, and public transport and leaner private sector Dubai has survived and largely silenced its crtics. Increasing fuel and food prices and a weaker currency will still pose challenges but that is true for most of the world and though the boom years may be over for now in Dubai , but it has proved remarkably resilient and looking at the rest of the world’s economic bad news the new bond will probably sell out quickly.

MS11-037/KB2544893 – Important (XP, Vista, W7)/Low (2003, 2008, 2008R2): The way Windows handles the MHTML protocol can result in “information disclosure” (it looks like it would be similar in effect to a cross site scripting attack). You will want to patch this on your usual schedule.

MS11-038/KB2476490 – Critical (XP, Vista, W7, 2003, 2008, 2008 R2): Image files in the WMF format can be used to perform remote code execution attacks, thanks to a vulnerability in the OLE Automation subsystem, this patch fixes it. Since it is easy to get a Web browser to display an image file, you should apply this patch immediately.

MS11-040/KB2520426 – Critical (Threat Management Gateway 2010 Client): The TMG client has a flaw that allows remote code execution attacks to be performed. If you use the TMG client, you should install this patch.

MS11-041/KB2525694 – Critical (Vista, W7, 2008, 2008 R2)/Important (XP, 2003): Problems with the OpenType font handler can allow remote code execution and escalation of privilege attacks. This patch closes those holes. Since an attacker can point a Web page to a network share to get a font file, you will want to close the hole with this patch as soon as you can.

MS11-042/KB2535512 – Critical (XP, 2003), Important (Vista, W7, 2008, 2008 R2): A flaw in the way Windows handles DFS processing can allow DoS and remote code execution attacks to be performed. Of course, you should be blocking DFS at the firewall, but this is still a concerning issue that you will want to patch immediately.

MS11-043/KB2536276 – Critical (XP, Vista, W7, 2003, 2008, 2008 R2): SMB packets can be used to exploit a vulnerability and perform remote code execution attacks. Like the DFS patch, you should be blocking this at the firewall, but you will still want to install this patch quickly.

MS11-044/KB2538814 – Critical (XP, Vista, W7, 2003, 2008, 2008 R2): A flaw in the .NET Framework and the XBAP handling system can allow applications to run code that they are not allowed to run. This is a critical issue and should be treated as an emergency patch scenarioThe patch has some known issues that you should review first,

MS11-045/KB2537146 – Important (Office XP, Office 2003, Office 2007, Office 2010, Office 2004 for Mac, Office 2008 for Mac, Office 2011 for Max, Open XML File Format Converter for Mac, Excel Viewer, Office Compatibility Pack): This patch resolves a eight vulnerabilities when opening Excel files, which can give the attacker the same rights as the logged on user. Microsoft says this is an “important” patch, but Excel files are so widespread that I recommend that you do not hesitate to install the patch.

MS11-046/KB2503665 – Important (XP, Vista, W7, 2003, 2008, 2008 R2): A problem with the Ancillary Function Driver (used to hook Winsock to the kernel) can be exploited to perform escalation of privileges attacks. This is a good example of Microsoft rating a patch as “important” when it really should be “critical.” Install the patch quickly.

MS11-047/KB2525835 – Important (2008, 2008 R2): In the “odd bug of the month” category, a logged on user in a Hyper-V guest VM can send a malformed packet to the Hyper-V host in order to perform a denial of services attack. If you use Hyper-V, you should install this patch during your normal patch time.

MS11-048/KB2536275 – Important (Vista, W7, 2008, 2008 R2): A problem with SMB packet processing can lead to DoS attacks. Your firewall should block these out, but you will still watch to install the patch when you have the chance.

MS11-049/KB2543893 – Important (InfoPath 2007, InfoPath 2010, SQL Server 2005, SQL Server 2008, SQL Server 2008 R2, Visual Studio 2005, Visual Studio 2008, Visual Studio 2010): An XML editor control used in a number of Microsoft data handling products can be exploited to perform information disclosure attacks. Install this patch as needed for systems using the affected software, but check the KB article first for known vulnerabilities.

MS11-051/KB2518295 – Important (2003, 2008, 2008 R2): The Active Directory Certificate Services Web Enrollment is vulnerable to cross site scripting attacks that this patch fixes. This shouldn’t be available outside your network, and the patch only needs to be applied to your servers that support this functionality. Beware, the patch has some known “gotchas.”

MS11-052/KB2544521 – Critical (IE 6, IE 7, IE 8, IE 9): Vector Markup Language (VML) can be exploited in IE to perform remote code execution attacks. I didn’t even know that VML was still around. You will want to patch as soon as you can.

If you use the built-in M$ Windows Update or M$ Update services, then it’s a M$-capped – ie. a truncated – connection ( it used to run @ a miserly 4kb/sec .. ) – rather like dropping down to the old modem-speed connectivity …

Consider install & use of Autopatcher which queries the M$ download sites for your OS directly, and then downloads whatever it can find there – usually finding a more varied selection than the M$ updating services are able to display.

You can then apply those patches you wish to authorize. A bit like the Administrator-managed SUS/WSUS, but better – with fewer overheads, because directly end user-controlled

It’s also a good deal faster, customizable, storing downloaded patches on a logical drive or even a 2nd physical drive, ie. wherever you choose – and allow sufficient drive space – say 5 GB so those can be updated & redone as needed ( whereas M$ updating defaults to its own choice of directory & doesn’t allow user-defined destination selection )

Applied patches are shown in BLUE. Ones not yet applied to the system, are shown in BLACK

Microsoft Dynamics CRM Statement of Direction from Microsoft, and outlines the future direction of Microsoft Dynamics CRM for both the short and the longer term. This May 2011 update release is just 7 pages long but it covers some powerful features

Microsoft remains committed to the “power of choice” to deploy EITHER cloud-based and on-premise versions of Microsoft Dynamics CRM.

SOCIAL CRM! social will be part of the future CRM roadmap e.g: micro-blogging, business activity feeds, and social intelligence.

Collaboration capabilities from Microsoft SharePoint, Microsoft Lync, and Microsoft Office. While Microsoft’s Skype acquisition was too late breaking for this document, it wouldn’t surprise me to see some Skype-to-CRM integration in the future.

The day after World IPv6 test Day, it looks as if the Internet 1.0 has been getting back to its IPv4-borne normality. Monitoring centres report that the IPv6 has one again retreated to the shadows with traffic “falling off a cliff.” For the 24-hour test period, which ran from midnight UTC (ET+4) on 8 June, IPv6 traffic appears to have roughly doubled but that means little because there are relatively few users.

As of midday Wednesday, the testing appeared to be going without a hitch, with none of those participating in the effort reporting any significant problems, said John Curran, chief executive of the American Registry for Internet Numbers (ARIN). “It has been a remarkable success,” Curran said. World IPv6 Day boosted the amount of native IPv6 traffic on the Internet, but it mostly increased the use of transitional protocols that won’t help to solve the looming shortage of IPv4 addresses. Most of the additional traffic on Wednesday didn’t use IPv6, but rather a variety of protocols designed to allow IPv6 to coexist with networks dominated by IPv4. More than a thousand Web pages, including ones at Google, Facebook, Yahoo and other major destinations, temporarily were made available over both IPv6 and IPv4

Meanwhile Cisco predicts that the number of network-connected devices will be more than 15 billion, twice the world’s population, by 2015. In the fifth annual Cisco Visual Networking Index (VNI) Forecast (2010-2015) the company said the total amount of global Internet traffic will quadruple by 2015 and reach 966 exabytes per annum.

IPv6 is an IP address standard designed to replace the current IPv4 protocol, in use since the 1980s for routing Internet traffic. The new protocol (available for several years) supports several magnitudes more address spaces than IPv4, while also providing better security and reliability.

Even so, few companies e upgraded to it because of the perceived complexity . That is expected to start quickly changing, because the IPv4 protocol has almost run out of unique IP addresses for all the websites, computers and other devices that are connecting to the Internet on a daily basis.

IPv4 addresses are 32-bit numbers, while the IPv6 protocol uses 128-bit numbers. The difference is like a postal system with a five-digit ZIP code, compared to one with a nine-digit ZIP code. IPv4 systems were designed to handle smaller addresses, whereas IPv6 systems rely on 128-bit addresses.

A failure to properly accommodate the much longer address space in IPv6 by network vendors, security vendors, software makers and others may result in vulnerabilities such as buffer overflow flaws and those that enable denial-of-service attacks and address spoofing,

Enterprises willneed to support both protocols for several more years in order to ensure that their websites and services are accessible to others and vice versa; that could be a problem as well.

Microsoft today said it will issue 16 security updates next week to patch 34 vulnerabilities in Windows, Internet Explorer (IE), Office, SQL Server and other products( typically patches are ‘heavier’ in even months.)

Of the 16 updates, nine will be rated “critical,” the highest threat label in Microsoft’s four-step scoring system, while the remaining seven will be marked “important,” the second-most-dire ranking.

The company also regularly updates IE on even-numbered months, and will patch its browser next week in two separate bulletins, an unusual move. Both IE updates were labeled critical. All versions of IE will receive one of the updates, including IE9,

Several of the updates will patch Windows 7, Microsoft’s newest operating system that continues to gain users. According to Web metrics company Net Applications, Windows 7 now accounts for 26% of all operating systems currently in use. Eight of the 10 Windows updates affect Windows 7, with five of those marked critical. The other three were tagged important by Microsoft.

The 16 updates from Microsoft will be released at approximately 1 p.m. ET on June 14.

Hewlett-Packard says that its customers run more Oracle databases and applications on HP hardware than any other vendor. But at HP’s big user conference this week no Oracle presence and one conference session is titled “Oracle database migrations to Microsoft SQL Server with HP services.”

Microsoft had a supersized presence at this year’s conference, the result of a joint $250 million, three-year investment that HP and Microsoft announced last year to improve the integration of their products.

The benefits of investment include newly announced products optimized for Microsoft SQL Server, including the HP Business Data Warehouse Appliance, and HP Database Consolidation Solution for Microsoft SQL, used for consolidating transactional databases.

Unique business benefits of Handpunch for Access control and Time and Attendance recording.

User and administrator acceptance

Ease of use and enrollment

High robustness and reliability

Does not have the ‘police’ connotations of fingerprints

These attributes results in both a low error rate and a fast validation – both of which guarantee:

the high throughput that is essential at shift changeovers

a lot less hassle for administrators

reduced complaints and payroll disputes for end users

How is this achieved?

Silver dosed base to eliminate risk of contamination

The system records over 100 measurements of a person’s hands – so, even if it cut or dirty, palm up or palm down or with or without a ring then most of the measurements do not change so amthc cna be amde with high accuracy.

The system self adjusts to minor changes in an individuals template e.g. adding a wedding ring, a scar, gaining or losing weight.

Unlike a fingerprint, or face image it takes very little data storagesapce to record an individual’s measurements which means: Thousands of records can be stored at each terminal

No network traffic to recover individual templates

Minimal network traffic to synchronise templates across a network of devices so you can enroll on one device in your company and then use any other device connected to your network.

More data storage is available to store offline transactions with battery back up to ensure you never lose a transaction.

Improves payroll accuracy and simplicity

Eliminate ‘buddy-punching’ and time fraud. Suitable for businesses of all sizes which continually strive to control costs.

In addition to veryfying that ‘you are you’, the HandPunch meets the special needs of computerised time and attendance systems.

Integrated with leading time & attendance software systems they reduce the large overhead and inaccuracies of a manual payroll process to just a simple ‘punch’ of the hand with an integrated biometric payroll process.

Programmable Data Management Keys User-definable data management keys let you collect and/or display data as employees punch. Common data collection uses include: department transfers, tips collected, job codes, or pay codes. The keys can also be defined to allow employees to review punches. To reduce keystrokes, the keys can also be set to automatically enter data such as a frequently used department number or in/out status.

Global Schedules 64 different employee schedules can be defined to restrict the times that an employee can punch. This can reduce unauthorised overtime as well as early ‘in’ punches. A separate schedule can be defined for 64 groups of employee providing the ultimate in flexibility.

Communications and Networking Whether your needs are to network two terminals or thousands, the HandPunch* can be configured to meet your needs. Standard RS-485 communications makes networking terminals easy and reliable. Options include an Ethernet Communications Modules and a high speed internal modem for remote sites.

Each unit also provides RS-232 serial printer support.

Edit-at-the-Clock Functions The HandPunch* allows supervisors to override user restrictions and to input such items as missed punches, planned vacations, and sick time at the terminal.

A paintbrush is just that, a paintbrush that in the right hands can wield art that is priceless.

So goes the way of ERP (Enterprise Resource Planning) systems. Erp is a business tool (albeit a sophisticated one) and like any other tool, in the hands of a skilled craftsman can work wonders for an organization.

Why is this relevant? Time and time again we see prospective customers looking into the depths of an ERP system demo, orcreating 1000 quedstion rfp for a capability to meet a “requirement,” but don’t use the same scrutiny when looking for the partner to implement and to support the system. A reference check may be completed, but a serious discussion around ideas to IMPROVE their business does not take place. They end up with a new paintbrush and use it the same way. To change metaphors this is what we call changing the piano and playing the same tune.

An ERP implementation partners all have a set of brushes and they can all paint, but some have significantly more expertise in wielding the same brush as another.

So don;t paying so much attention to the system being implemented and start paying more attention to the partner chosen, and when you look s the cost quesiton whether his works are really masterpieces.

A good partner does not recommend a bad system and will make the system work for you. Even the best system implemented by novices and amateurs will fail. The use of sub-contract labour is also a consideration. What happens when you want to repaint if the expert painters have left, how much more committed to quality is a partner providing local support with its own resources? Why do some partners charge more than others- maybe you get what you pay for – no partners want to lose business so if they have been in business a long time, then they will price at market rates – if that seems high you have to wonder why another would undercut and what else they cut in quality and service.

Most cars can list a similar list of features, a driving wheel an engine, 4 wheels, brakes lights etc so why doesn’t everyone just drive the cheapest one? After all they get you from A to B. Why go to a certified garage when freelancer engieerss will cut the cost? Why buy branded spares?

No support ocntract is like no insurance cover? And not all insurance polices are the same. Is there a skilled, manned helpdesk to answer queries?

So why use a different basis of selection for your key business system and partner?.

Buying a new car to rpelace oen witjh bugs, or a new paintbrush that is easier to use is relatively painless comapred to having to switch implementation partners mi- project. In the long run the right solution implemented by the right partner is the most effective, and the fastest, and the cheapest.

Reduce the Microsoft Dynamics total cost of ownership,when you adopt the Sure Step Methodology for projects ranging from large, medium, to small engagements as well as optimization and upgrade projects. The Sure Step Methodology provides detailed guidance on roles required to perform activities and proven best practices. Flowchart diagrams within this implementation methodology point you to tools and templates that can be used at different phases during an implementation project from diagnosis, analysis, design, development, deployment, operation, and also through an optimization or upgrade project. The content tools and best practices of this implementation methodology help you increase the quality and success of your implementations.

This is a professional methodlogy derived from PMP, Synergy Software Systems also enhances this with a Rapid Implementation toolset: Preparation pack, our proprietary training materials, templates, checklists, pilots, and audits, Vital sign montoring and psot go live advsnced training and support – all reinforced by exceptionally well quslified consultants, and our own Microsoft Cerfied trainers and a manned helpdesk. Does this really work? Ask our clients!

Synergy is a well established, solution provider across the Middle East region.
Synergy has a strong presence in several key verticals; Manufacturing, Construction, Hospitality Insurance, Financial Services, Government. Media, Oil and Gas, Distribution.
Synergy is particularly well known as a Gold Partner of both Infor Sunsystems, and Microsoft Dynamics Ax and for its implementation expertise and exceptional support. It is based centrally in Dubai in the Karama district since it was registered in 1991, and occupies a 7,000 sq ft office with around 80 full time employees.